We performed a comparison between Splunk User Behavior Analytics and Trend Micro Deep Discovery based on real PeerSpot user reviews.
Find out in this report how the two Intrusion Detection and Prevention Software (IDPS) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The solution is definitely scalable."
"We are really pleased with Splunk and its features. It would be practically impossible to function without it. To provide a general overview of the system, it's important to note that the standard log files are currently around 250 gigabytes per day. It would be impossible to manually walk through these logs by hand, which is why automation is essential."
"The solution appears to be stable, although we haven't used it heavily."
"The most valuable features are its data aggregation and the ability to automatically identify a number of threats, then suggest recommended actions upon them."
"The solution is fast, flexible, and easy to use."
"It is a solution that helps test and measure customer satisfaction."
"The solution's most valuable feature is Splunk queries, which allow us to query the logs and analyze the attack vectors."
"The most valuable feature is the ability to search through a large amount of data."
"The performance and stability are great."
"The most valuable feature of Trend Micro Deep Discovery is its complete end-to-end visibility of threats."
"Deep Discovery is scalable and compatible with other products. It's crucial to have that compatibility because it's an integral part of our security solution. It integrates smoothly. The interface is user-friendly, so administration is simple."
"The solution has extension-based features that help it to analyze the environment. The environment can have different platforms like Windows, Linux, and Mac. The tool will give a report which can confirm the analysis of the issues. You can also get clear information on threats or suspicious files."
"The tool's stability and performance are good."
"There is no downtime or server vulnerability with this solution."
"Generally speaking, it just gives us a broad understanding of exactly what kind of threats occur. The submission point, analyzing point, and virtualization are within the environment that it supports. It helped us to improve our security levels and protect our internal network from any threats outside."
"As a security product, managing threats is crucial for my clients."
"Currently, a lot of network operations need improvement. We still need people to handle incidents. Our vision is to leverage status and convert it directly from the network devices. It would be ideal if we could take action using APIs and API code and remove manual processes."
"I'm not aware of any lacking features."
"I would like improved downward integration with other tools such as McAfee and other GCP solutions."
"It would be good if the solution had an analytics tool that allowed us to analyze the data without writing specific queries."
"We want to have an automated system for bot hunting that enables us to detect anomalies predictively based on historical data. It would be helpful if Splunk included process mining as an alternative option. We have a threat workflow, but it would be useful if we could supplement that with some process mining capabilities over time."
"The ability to do more complicated data investigation would be a welcome addition for pros, though the functionality now gives most people what they need."
"They should work to add more built-in correlation searches and more use cases based on worldwide customer experiences. They need more ready-made use cases."
"We'd like the ability to do custom searches."
"The solution should support multiple platforms in Windows, Linux, and Mac. Customers can have different software types. The virtual environment should be able to install and analyze them. The tool also gives only a minimum level of extension support. It may not be able to extract files and give details about them. I would also like to see third-party product integration in the tool. The solution's current integration is only with Trend Micro products only."
"I would like to see them create a rule where It could integrate with the network and start mitigating with auto-detection."
"The solution could be more stable and offer more security."
"This solution could be improved with faster technical support and cheaper licensing prices."
"Trend Micro Deep Discovery's technical support could be improved, and it could be made more active."
"There are certain aspects of flexibility in the policies that should be added to Deep Discovery."
"The solution needs to be able to integrate better with third-party infrastructure."
"Deep Discovery is easy to manage, but there is still room for improvement on the administration and operations side. Competing products have a cleaner interface that makes it easier to manage their products. Trend Micro offers a lot of features in one product suite, but it can be unwieldy for the customer to manage all that with a single interface."
More Splunk User Behavior Analytics Pricing and Cost Advice →
Splunk User Behavior Analytics is ranked 12th in Intrusion Detection and Prevention Software (IDPS) with 18 reviews while Trend Micro Deep Discovery is ranked 6th in Intrusion Detection and Prevention Software (IDPS) with 24 reviews. Splunk User Behavior Analytics is rated 8.2, while Trend Micro Deep Discovery is rated 8.2. The top reviewer of Splunk User Behavior Analytics writes "Easy to configure and easy to use solution that integrates with many applications and scripts ". On the other hand, the top reviewer of Trend Micro Deep Discovery writes "Good threat detection capabilities and offers flexibility for hosting options". Splunk User Behavior Analytics is most compared with Darktrace, Microsoft Defender for Identity, IBM Security QRadar, Cynet and Exabeam Fusion SIEM, whereas Trend Micro Deep Discovery is most compared with Darktrace, Trend Micro TippingPoint Threat Protection System, Arista NDR, Vectra AI and Palo Alto Networks Advanced Threat Prevention. See our Splunk User Behavior Analytics vs. Trend Micro Deep Discovery report.
See our list of best Intrusion Detection and Prevention Software (IDPS) vendors.
We monitor all Intrusion Detection and Prevention Software (IDPS) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.